Cooperation Stimulation and Security in Wireless Ad Hoc Networks — A Power-Efficient Bayesian Game Approach

In wireless ad hoc networks (WANETs), collaboration among nodes is usually inefficient and the network is vulnerable to various attacks. Although some intrusion detection systems (IDSs) and reputation strategies have been proposed to enhance the network's robustness, the significant power consumption they cause will reduce the networks' lifetime. In this paper, we propose a power-efficient mechanism based on game theoretic analysis to improve the security of WANETs and stimulate the cooperation among nodes. Specifically, we introduce two detection modes for the IDS and formulate the interactions between malicious/regular nodes and IDSs as a Bayesian game. The Nash equilibrium strategies in static Bayesian game model is firstly analyzed, which can not only reduce the probability of misbehaviors (e.g., attacks and non-cooperations) but also prolong the IDS's service time. Then, We extend the static game to a multi-stage imperfect dynamic Bayesian game, in which the IDS updates its belief based on observations and nodes' equilibrium strategy will also change accordingly. Finally, the perfect Bayesian equilibrium (PBE) knowledge is applied to analyze this game, based on which the optimal monitoring scheme for IDS is made out. Simulations on two typical networks demonstrate the effectiveness and practicability of the proposed approach.

[1]  Mainak Chatterjee,et al.  Coexistence with malicious nodes: A game theoretic approach , 2009, 2009 International Conference on Game Theory for Networks.

[2]  Jie Wu,et al.  Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[3]  Madasamy Kaliappan,et al.  Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model , 2015, Comput. Electr. Eng..

[4]  Sushanta Karmakar,et al.  Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .

[5]  Afrand Agah,et al.  A Game-theoretic Approach to Security and Power Conservation in Wireless Sensor Networks , 2013, Int. J. Netw. Secur..

[6]  Yoav Shoham,et al.  Essentials of Game Theory: A Concise Multidisciplinary Introduction , 2008, Essentials of Game Theory: A Concise Multidisciplinary Introduction.

[7]  Zhu Han,et al.  Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .

[8]  K. J. Ray Liu,et al.  Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[9]  Leonardo Badia,et al.  Using game theory and Bayesian networks to optimize cooperation in ad hoc wireless networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[10]  Chase Qishi Wu,et al.  On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks , 2010, SpringSim.

[11]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[12]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[13]  Yang Li,et al.  MAC layer anomaly detection in ad hoc networks , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.